Lecture 7 Flashcards
Malicious code (35 cards)
A threat that exploits various vulnerability to spread malicious payloads is called what?
Malicious code
People who are extremely skilled software developers and develop maliciuos code are called what?
A. Skilled malicious code programmers
B. Script kiddies
A. Skilled malicious code programmers
A person that uses existing and well known techniques and programs or scripts are called what?
A. Skilled malicious code programmers
B. Script kiddies
B. Script kiddies
Macro virus uses what?
script functionality
This virus is stored is stored in the MBR and another location in the system.
master boot record (MBR) virus
This virus type infects executable files and triggers when the OS tries to execute them.
File infector virus
Why are there fewer UNIX viruses?
they are developed on entirely different kernels make it difficult to write a virus that would impact a large number of UNIX systems
Signature based antivirus works how?
Use a database of known signatures to find a virus
A virus that uses more than 1 propagation technique is called what?
A. Stealth
B. Multipart
C. Hidden
D. Rootkit
B. Multipart
What type of virus hides by tampering with the OS?
A. Stealth
B. Multipart
C. Hidden
D. Polymorphic
A. Stealth
This virus modifies its code as it moves from system to system.
A. Stealth
B. Multipart
C. Polymorphic
D. Rootkit
C. Polymorphic
This virus encrypts their code with different cryptographic keys to avoid detection.
A. Stealth
B. Encrypted
C. Polymorphic
D. Rootkit
B. Encrypted
What is a logic bomb virus?
It lies dormant until a specific trigger is met..Can be time or a particular action being performed
What time of virus looks benign but is really malicious?
Trojan Horse
What is a worm?
Malicious code that can self propagate.
The code red worm did 3 things. What were they?
Look for vulnerable versions of IIS
Defaced html pages on the local web server
planted a logic bomb
This worm searched for a Siemans controller to disrupt nuclear facilities by destroying the centrifuge.
Stuxnet
This type of malicious code monitors your actions and collects information and transmits it back to a remote system.
Spyware
What are the three key places to implement countermeasures of malicious code?
Clients
Servers
Content filters (ex: email)
This type of DDos compromised third party systems to install a program and lies dormant waiting for instruction.
A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop
B. Trinoo and Tribe Flood Network
This attack uses one or more third party newtorks to conduct an attack.
A. Syn Flood
B. Trinoo and Tribe Flood Network
C. Smurf
D. Teardrop
C. Smurf (distributed reflective denial-of-service attack) (DRDos)
A DNS amplification attack is used to what?
Send a large volume of unwanted traffic to a third party.
this type of attack is where a fragmented packet is sent that does not conform to the fragmentation protocol specification. The system doesn’t know how to handle this and can crash.
Teardrop
This type of attack occurs when an artificial TCP segmnt has the SYN flag set and the source and destination IP are set to the victim machine.
Land attack